You are on page 1of 14

scanning and analysis tools in

Security
What are scanning and analysis tools
Scanning and analysis tools are computer programs that used
to find vulnerabilities in systems.

For examples, the vulnerabilities of specific hosts, routers,


or even firewalls.
• Many scanning and anaylsis tools are developed by hackers
community, or so called,  ‗hackerware‘.
• A Hacker is a person who finds and exploits the weakness in
computer systems and/or networks to gain access.
•  Hackers are usually skilled computer programmers with
knowledge of computer security.

• Hackers use scanning and analysis tools to find the


vulnerabilities of the network while the same tools can also
be used by network defenders to find potential vulnerabilities
and secure it.
• Categories of scanning and analysis tools
• There are several categories of scanning and analysis tools.
• 1. port scanners
• Port scanners are tools used by both attackers and
defenders to identify the computers that are active on a
network, as well as the ports and services active on those
computers.
• 2.network mappers
• Network mappers are tools that identify all systems
connected to a network.
3.
OS detection tools
Tools that detect target host‘s operating system.
Knowing a host‘s OS is critical is one is to exploit the host‘s
vulnerabilities.
For example, the known bugs of that OS.

4.Firewall analysis tools


Helps in understanding and discovery of firewall rules and assist
the administrator in analyzing the rules to determine exactly
what they allow and what they reject
5.  Vulnerability scanners
Software tools that assess security vulnerabilities in network & hosts and
produce a set of scan results.
6.Packet sniffers
 A network tool that collects copies of packets from the network and analyze
s them.
What is packet sniffers
 A packet sniffer is a tool that plugs into a computer network and monitors a
network traffic.
7.Wireless sniffers  A software or maybe hardware
that is capable of capturing & decoding packets as they pass over airwaves.
Biometric security system
• The biometric security system is a lock and
capture mechanism to control access to
specific data. In order to access the biometric
security system, an individual will need to
provide their unique characteristics or traits
which will be matched to a database in
the system.
• Many organizations, governmental and
private, have started adopting high label of
access control security systems for physical
entry into their facilities. Whether it is a
simple non intelligent access control system
like a punching in a password, or advanced
biometric systems that scan and permit entry
very specifically, there are many advantages to
employing these security systems.
• Biometric systems will collect and store this data in order
to use it for verifying personal identity. The combination
of biometric data systems and biometrics recognition/
identification technologies creates the biometric security
systems. The biometric security system is a lock and
capture mechanism to control access to specific data. In
order to access the biometric security system, an
individual will need to provide their unique characteristics
or traits which will be matched to a database in the
system. If there is a match, the locking system will provide
access to the data for the user.
• Advantages of Biometrics Access Control Syste
m
• Biometric systems will collect and store this
data in order to use it for verifying personal
identity. The combination of biometric data
systems and biometrics recognition/
identification technologies creates the
biometric security systems.
• Reduced Requirement for Manpower
• Allows Access and Restriction to Multiple
Entries and Exits
• Internal Levels of Restriction and Access
• Time Based Control for Security Systems
• Keeping Check of Punch-in and Punch-out
Time
• Biometric Systems
• Face Recognition and Voice Recognition in
Biometrics
• Simply put, novel biometric measures, such as
face or voice recognition belong to the safety
authentication measures related to 
what the user is. 
• Your iris is as unique as your fingerprints
The blood vessels in your eyes and the whorls at the tip of your
fingers make you one of a kind. No other person in the world shares
exactly those peculiarities.
• The Sense Behind Biometric Measures
• Biometric measurement is more like mapping your face than like
taking a photo of your face. The biometric scanner digitizes thousands
of points, distances and proportions of your face distortions. For
example, it will compare distances between your chin and your
forehead or locate where exactly is your nose.
• It will look for patterns in the finger whorls or, in the case of voice
recognition, discover the unique shape of a person’s mouth or throat
to confirm identit

You might also like